<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 21 May 2026 15:04:54 +0000</lastBuildDate>
    <item>
      <title>8f062ed2-4e68-410c-a539-0d35d655b60a</title>
      <link>https://db.gcve.eu/sighting/8f062ed2-4e68-410c-a539-0d35d655b60a/export</link>
      <description>{"uuid": "8f062ed2-4e68-410c-a539-0d35d655b60a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2699", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ll4kmpclin2m", "content": "", "creation_timestamp": "2025-03-24T10:34:19.192193Z"}</description>
      <content:encoded>{"uuid": "8f062ed2-4e68-410c-a539-0d35d655b60a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2699", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ll4kmpclin2m", "content": "", "creation_timestamp": "2025-03-24T10:34:19.192193Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/8f062ed2-4e68-410c-a539-0d35d655b60a/export</guid>
      <pubDate>Mon, 24 Mar 2025 10:34:19 +0000</pubDate>
    </item>
    <item>
      <title>593f8abc-559d-4921-81d9-510ab1bb76f9</title>
      <link>https://db.gcve.eu/sighting/593f8abc-559d-4921-81d9-510ab1bb76f9/export</link>
      <description>{"uuid": "593f8abc-559d-4921-81d9-510ab1bb76f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26992", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmu3tdelpp24", "content": "", "creation_timestamp": "2025-04-15T12:38:42.444401Z"}</description>
      <content:encoded>{"uuid": "593f8abc-559d-4921-81d9-510ab1bb76f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26992", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmu3tdelpp24", "content": "", "creation_timestamp": "2025-04-15T12:38:42.444401Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/593f8abc-559d-4921-81d9-510ab1bb76f9/export</guid>
      <pubDate>Tue, 15 Apr 2025 12:38:42 +0000</pubDate>
    </item>
    <item>
      <title>d27bc886-49fb-45ba-85b0-7e33184880cc</title>
      <link>https://db.gcve.eu/sighting/d27bc886-49fb-45ba-85b0-7e33184880cc/export</link>
      <description>{"uuid": "d27bc886-49fb-45ba-85b0-7e33184880cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26990", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmu3tdhwva2r", "content": "", "creation_timestamp": "2025-04-15T12:38:43.049625Z"}</description>
      <content:encoded>{"uuid": "d27bc886-49fb-45ba-85b0-7e33184880cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26990", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmu3tdhwva2r", "content": "", "creation_timestamp": "2025-04-15T12:38:43.049625Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d27bc886-49fb-45ba-85b0-7e33184880cc/export</guid>
      <pubDate>Tue, 15 Apr 2025 12:38:43 +0000</pubDate>
    </item>
    <item>
      <title>b63f31a8-8987-40aa-a8bf-c0408b295b97</title>
      <link>https://db.gcve.eu/sighting/b63f31a8-8987-40aa-a8bf-c0408b295b97/export</link>
      <description>{"uuid": "b63f31a8-8987-40aa-a8bf-c0408b295b97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26990", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11790", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26990\n\ud83d\udd25 CVSS Score: 4.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: Server-Side Request Forgery (SSRF) vulnerability in WP Royal Royal Elementor Addons allows Server Side Request Forgery. This issue affects Royal Elementor Addons: from n/a through 1.7.1006.\n\ud83d\udccf Published: 2025-04-15T11:59:07.117Z\n\ud83d\udccf Modified: 2025-04-15T11:59:07.117Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/royal-elementor-addons/vulnerability/wordpress-royal-elementor-addons-plugin-1-7-1006-server-side-request-forgery-ssrf-vulnerability?_s_id=cve", "creation_timestamp": "2025-04-15T12:54:33.000000Z"}</description>
      <content:encoded>{"uuid": "b63f31a8-8987-40aa-a8bf-c0408b295b97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26990", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11790", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26990\n\ud83d\udd25 CVSS Score: 4.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: Server-Side Request Forgery (SSRF) vulnerability in WP Royal Royal Elementor Addons allows Server Side Request Forgery. This issue affects Royal Elementor Addons: from n/a through 1.7.1006.\n\ud83d\udccf Published: 2025-04-15T11:59:07.117Z\n\ud83d\udccf Modified: 2025-04-15T11:59:07.117Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/royal-elementor-addons/vulnerability/wordpress-royal-elementor-addons-plugin-1-7-1006-server-side-request-forgery-ssrf-vulnerability?_s_id=cve", "creation_timestamp": "2025-04-15T12:54:33.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b63f31a8-8987-40aa-a8bf-c0408b295b97/export</guid>
      <pubDate>Tue, 15 Apr 2025 12:54:33 +0000</pubDate>
    </item>
    <item>
      <title>e4787519-0b04-453d-8a69-29a9cb49c3dc</title>
      <link>https://db.gcve.eu/sighting/e4787519-0b04-453d-8a69-29a9cb49c3dc/export</link>
      <description>{"uuid": "e4787519-0b04-453d-8a69-29a9cb49c3dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26990", "type": "seen", "source": "https://t.me/cvedetector/22940", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26990 - Royal Elementor Addons SSRF\", \n  \"Content\": \"CVE ID : CVE-2025-26990 \nPublished : April 15, 2025, 12:15 p.m. | 52\u00a0minutes ago \nDescription : Server-Side Request Forgery (SSRF) vulnerability in WP Royal Royal Elementor Addons allows Server Side Request Forgery. This issue affects Royal Elementor Addons: from n/a through 1.7.1006. \nSeverity: 4.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-15T15:46:13.000000Z"}</description>
      <content:encoded>{"uuid": "e4787519-0b04-453d-8a69-29a9cb49c3dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26990", "type": "seen", "source": "https://t.me/cvedetector/22940", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26990 - Royal Elementor Addons SSRF\", \n  \"Content\": \"CVE ID : CVE-2025-26990 \nPublished : April 15, 2025, 12:15 p.m. | 52\u00a0minutes ago \nDescription : Server-Side Request Forgery (SSRF) vulnerability in WP Royal Royal Elementor Addons allows Server Side Request Forgery. This issue affects Royal Elementor Addons: from n/a through 1.7.1006. \nSeverity: 4.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-15T15:46:13.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/e4787519-0b04-453d-8a69-29a9cb49c3dc/export</guid>
      <pubDate>Tue, 15 Apr 2025 15:46:13 +0000</pubDate>
    </item>
    <item>
      <title>057b480e-3c10-4b9c-a3fe-b949f4ce12c3</title>
      <link>https://db.gcve.eu/sighting/057b480e-3c10-4b9c-a3fe-b949f4ce12c3/export</link>
      <description>{"uuid": "057b480e-3c10-4b9c-a3fe-b949f4ce12c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26992", "type": "seen", "source": "https://t.me/cvedetector/22941", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26992 - Fatcatapps Landing Page Cat Cross-site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26992 \nPublished : April 15, 2025, 12:15 p.m. | 52\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in fatcatapps Landing Page Cat allows Reflected XSS. This issue affects Landing Page Cat: from n/a through 1.7.8. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-15T15:46:14.000000Z"}</description>
      <content:encoded>{"uuid": "057b480e-3c10-4b9c-a3fe-b949f4ce12c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26992", "type": "seen", "source": "https://t.me/cvedetector/22941", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26992 - Fatcatapps Landing Page Cat Cross-site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26992 \nPublished : April 15, 2025, 12:15 p.m. | 52\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in fatcatapps Landing Page Cat allows Reflected XSS. This issue affects Landing Page Cat: from n/a through 1.7.8. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-15T15:46:14.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/057b480e-3c10-4b9c-a3fe-b949f4ce12c3/export</guid>
      <pubDate>Tue, 15 Apr 2025 15:46:14 +0000</pubDate>
    </item>
    <item>
      <title>0ebf68b9-e719-4937-aaeb-4cb4003a579b</title>
      <link>https://db.gcve.eu/sighting/0ebf68b9-e719-4937-aaeb-4cb4003a579b/export</link>
      <description>{"uuid": "0ebf68b9-e719-4937-aaeb-4cb4003a579b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26999", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-18T13:31:24.000000Z"}</description>
      <content:encoded>{"uuid": "0ebf68b9-e719-4937-aaeb-4cb4003a579b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26999", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-18T13:31:24.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/0ebf68b9-e719-4937-aaeb-4cb4003a579b/export</guid>
      <pubDate>Mon, 18 Aug 2025 13:31:24 +0000</pubDate>
    </item>
    <item>
      <title>5f6c77dd-a7f5-4dd0-b811-f56b4849444e</title>
      <link>https://db.gcve.eu/sighting/5f6c77dd-a7f5-4dd0-b811-f56b4849444e/export</link>
      <description>{"uuid": "5f6c77dd-a7f5-4dd0-b811-f56b4849444e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26999", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-19T02:47:47.000000Z"}</description>
      <content:encoded>{"uuid": "5f6c77dd-a7f5-4dd0-b811-f56b4849444e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26999", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-19T02:47:47.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/5f6c77dd-a7f5-4dd0-b811-f56b4849444e/export</guid>
      <pubDate>Tue, 19 Aug 2025 02:47:47 +0000</pubDate>
    </item>
    <item>
      <title>d260a7bf-428b-4d96-9dc5-081837f2048a</title>
      <link>https://db.gcve.eu/sighting/d260a7bf-428b-4d96-9dc5-081837f2048a/export</link>
      <description>{"uuid": "d260a7bf-428b-4d96-9dc5-081837f2048a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26994", "type": "seen", "source": "MISP/e1f6260f-3311-441b-92ae-e04cd5eb5f72", "content": "", "creation_timestamp": "2025-08-19T13:26:46.000000Z"}</description>
      <content:encoded>{"uuid": "d260a7bf-428b-4d96-9dc5-081837f2048a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26994", "type": "seen", "source": "MISP/e1f6260f-3311-441b-92ae-e04cd5eb5f72", "content": "", "creation_timestamp": "2025-08-19T13:26:46.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d260a7bf-428b-4d96-9dc5-081837f2048a/export</guid>
      <pubDate>Tue, 19 Aug 2025 13:26:46 +0000</pubDate>
    </item>
    <item>
      <title>00e6fbdb-d093-4c36-9d85-8408dd272c8c</title>
      <link>https://db.gcve.eu/sighting/00e6fbdb-d093-4c36-9d85-8408dd272c8c/export</link>
      <description>{"uuid": "00e6fbdb-d093-4c36-9d85-8408dd272c8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26995", "type": "seen", "source": "MISP/8e1b6542-ae86-4729-a7a6-4e9f670b8bb7", "content": "", "creation_timestamp": "2025-08-22T17:25:06.000000Z"}</description>
      <content:encoded>{"uuid": "00e6fbdb-d093-4c36-9d85-8408dd272c8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26995", "type": "seen", "source": "MISP/8e1b6542-ae86-4729-a7a6-4e9f670b8bb7", "content": "", "creation_timestamp": "2025-08-22T17:25:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/00e6fbdb-d093-4c36-9d85-8408dd272c8c/export</guid>
      <pubDate>Fri, 22 Aug 2025 17:25:06 +0000</pubDate>
    </item>
  </channel>
</rss>
